IP Theft and National Security Responses

IP Theft and National Security

IP Theft and National Security IP Theft and national security have been in the news a lot of late.  Most of this news has been centered around the activities of the Chinese military.  As a result commercial and defense technologies are at risk.  Fortunately, the United States has implemented a number of measures aimed protecting … Read more

Electronics Supply Chain Challenges for U.S. Companies

Electronics Supply Chain Challenges

Supply Chain Challenges in a Changing Global Market COVID-19 has introduced additional electronics supply chain challenges.  This is especially the case for the electronics industry.  As a result companies will have to: Reconsider product designs.  Develop new procurement strategies. Provide effective risk management for data security. Further guard against counterfeit parts. Electronic products require a … Read more

Remote Workforce Cybersecurity Concerns Grow

Remote Workforce Cybersecurity

Business Executives Have Concern About Remote Workplace Cybersecurity Remote Workforce Cybersecurity is a growing concern for businesses who are adapting to the Covid-19 pandemic.  Although many tools are available to secure vital data, the remote employee still poses the greatest threat.  The challenge therefore is to train employees how to regularly use effective cybersecurity practices. … Read more

Industrial Control System Cybersecurity Practices

Industrial Control Systems Cybersecurity

Industrial Control System Cybersecurity Guidance for Industrial Control System (ICS) Cybersecurity was released on May 22, 2020.  This two page infographic is a joint release from the Cybersecurity and Infrastructure Security Agency (CISA), the Department of Energy (DOE), and the UK’s National Cyber Security Centre (NCSC).  This release addresses the urgent need for owners and … Read more

Cyberspace Solarium Commission Report – Grim

Cyberspace Solarium Commission Report

Cyberspace Solarium Commission Report – March 2020 The Cyberspace Solarium Commission Report, released in March 2020, paints a grim picture of the level of cyber vulnerability in the United States.  It stresses the need for immediate action from both the public and private sectors to deter looming catastrophe.  The report focuses on strategic approaches to … Read more

Concerns for Business Cybersecurity Capabilities

Concerns for Business Cybersecurity

Business Cybersecurity Report Card for 2019 There are growing concerns for business cybersecurity to meet the challenges of today’s hostile environment.  The international insurance underwriter Hiscox recently released its Hiscox Cyber Readiness Report 2019 and the news was not good.  The report showed that the number of cyber attacks has increased and that businesses of … Read more

Mozilla Firefox Vulnerabilities Show Need for Vigilance

Mozilla Firefox Vulnerabilities

High Profile Alerts Concerning Mozilla Firefox Vulnerabilities On January 8, 2020 the United States Department of Homeland Defense’s Cybersecurity and Infrastructure Security Agency (CISA) issued an alert concerning Mozilla Firefox vulnerabilities.  These vulnerabilities could allow external control of Mac and Windows computer operating systems by cyberattackers.  Mobile devices are not affected by this problem.  Mozilla … Read more

ISMS Consulting
and Cybersecurity

ISMS Consulting Services Our ISMS consulting services help organizations plan, create, upgrade, and certify a robust and effective Information Security Management System (ISMS).  Our team of experts bring extensive experience and deep information security process control expertise (including certifications as Exemplar Global Lead Auditor ISO/IEC 27001:2013 Lead Auditor) to ensure that you achieve ISO 27001 … Read more

Consultants and Advisors – CVG Strategy

Previous slide Next slide QUALITY TRAINING TESTING & EVALUATION ITAR & EXPORT COMPLIANCE CYBER SECURITY QUALITY TRAINING TESTING & EVALUATION ITAR & EXPORT COMPLIANCE CYBER SECURITY Consultants and Advisors – CVG Strategy Unique Providers of Consulting and Training CVG Strategy  consultants and advisors specialize in assisting small to mid-sized companies capitalize on opportunities for growth … Read more

Lockbit Extorsion Operation Interrupted by Operation Cronos

lockbit extorsion operation

The Lockbit extorsion operation was taken down by an international law enforcement effort called “Operation Cronos”.  This action included participation of the FBI, the National Crime Agency of the UK (NCA), and Europol among other organizations.  Actions taken include the UK,s National Crime Agency taking control of the ransomware’s site and the arrest of at … Read more

China is Targeting U.S. Infrastructure with Cyberattacks

China Targeting U.S. Infrastructure

The Washington Post reported that China is targeting U.S. infrastructure with cyberattacks in a continuing effort to increase its ability to disable critical systems.  The Cybersecurity and Infrastructure Security Agency (CISA) first announced these attacks in May of 2023.  CISA identified the source as Volt Typhoon, a state sponsored hacking group affiliated with China. Chinese … Read more

Lawsuit Filed Against Penn State for Cybersecurity Claims

Lawsuit Filed Against Penn State

A lawsuit filed against Penn State University by the U.S. Department of Justice illustrates the challenges the government faces in instituting effective protection of data.  The suit filed under the False Claims Act (FCA) alleges, that the university misrepresented its adherence to required cybersecurity protocols in the handling of Controlled Unclassified Information (CUI) required.    … Read more

Managing an Export Compliance Program

Managing an Export Compliance Program

Managing an Export Compliance Program (ECP) properly ensures its effectiveness.  These programs are essential to the sustainability of a business.  However, any plan, no matter how well conceived, is only as effective as its execution.   Planning the Export Compliance Program Specific requirements for an Export Compliance Program are contingent on the types of products an … Read more

Training for Export Compliance – ITAR and EAR

Training for Export Compliance

Regular training for export compliance is more important than ever.  This is due to dynamic changes in export regulations and increased enforcement of those regulations.  CVG Strategy offers up to date training for Export Administration Regulations (EAR) and International Traffic in Arms Regulations (ITAR).  Our training is interesting and engaging for participants and allows ample … Read more

Continuous Improvement and Organizational Development

Continuous Improvement and Organizational Development

What is Continuous Improvement? Continuous Improvement and Organizational Development are valuable tools in a Quality Management System (QMS).  For improvement to occur it is essential that each important process in an organization be identified and analyzed.  Once identified and documented, these processes can be regularly reviewed to access effectiveness by applying improvement based on metrics.  … Read more